tix / defcon31Links
☆35Updated 2 years ago
Alternatives and similar repositories for defcon31
Users that are interested in defcon31 are comparing it to the libraries listed below
Sorting:
- Infrastructure Automation☆353Updated last year
- Tuoni☆131Updated last month
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆190Updated 6 months ago
- Script collection to bypass Network Access Control (NAC, 802.1x)☆320Updated 3 months ago
- A tool to query for the existence of pre-windows 2000 computer objects.☆346Updated 3 months ago
- Ansible playbook to deploy a phishing engagement in the cloud.☆220Updated 3 years ago
- a tool to help operate in EDRs' blind spots☆754Updated 9 months ago
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆335Updated 10 months ago
- Retired TrustedSec Capabilities☆248Updated 9 months ago
- Completely Risky Active-Directory Simulation Hub☆103Updated last year
- winPEAS, but for Active Directory☆156Updated 5 months ago
- ☆122Updated last year
- Your template-based BloodHound terminal companion tool☆421Updated 2 weeks ago
- ☆232Updated 2 years ago
- Low and slow password spraying tool, designed to spray on an interval over a long period of time☆203Updated 3 months ago
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆540Updated 3 months ago
- ☆148Updated 5 months ago
- Malware As A Service☆135Updated last year
- User Enumeration of Microsoft Teams users via API☆164Updated last year
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆198Updated 3 weeks ago
- Discord C2 for Redteam....Need a better name☆134Updated 2 years ago
- Some scripts to abuse kerberos using Powershell☆342Updated 2 years ago
- PXEThief is a set of tooling that can extract passwords from the Operating System Deployment functionality in Microsoft Endpoint Configur…☆386Updated last year
- ☆199Updated 5 years ago
- Collection of some of my own tools with other great open source tools out there packaged into a powershell module☆145Updated 2 years ago
- Identifies the bytes that Microsoft Defender flags on.☆89Updated 3 years ago
- ☆105Updated last year
- WTF are these binaries doing?! A list of benign applications that mimic malicious behavior.☆166Updated 5 months ago
- LudusHound is a tool for red and blue teams that transforms BloodHound data into a fully functional, Active Directory replica environment…☆287Updated last month
- ☆300Updated 10 months ago